Career Paper

Cyber Threat Analysts

To remain ahead of the curve and protect our networks and data as the subject of cybersecurity evolves, it is becoming more vital for professionals in the industry to have a solid grounding in social science research and ideas. Cyber threat analysts, one branch of cybersecurity professionals, need extensive training in social science research and theory (Cabaj et al., 2018). The task of a cyber threat analyst is to identify, assess, and counteract online attacks and other hostile actions. Cyber threat analysts should be able to weigh the dangers and consequences of a threat against the work that can be done to eliminate it.

Cyber threat analysts need a broad understanding of the social sciences to execute their jobs properly. Systems thinking, risk management, and the psychology of security are some of the most applicable classroom topics to their jobs (King et al., 2018). Understanding how a change in one area of a system might influence the whole system requires a level of thinking known as “systems thinking.” Threats can be evaluated and countered via a process known as “risk management.” Lastly, the study of how individuals react to security risks is known as the psychology of security.

Cyber threat analysts must have a firm grasp of these ideas in order to make sense of the intricate web of connections between computers, people, and businesses. Cyber threat analysts can use systems thinking, for instance, to determine what components make up a system and how they work together, which can lead to discovering flaws that hackers might exploit. They can use risk management to assess the dangers presented by threats and devise countermeasures to lessen the chances of those dangers coming to fruition. Lastly, the psychology of security teaches them how to influence people’s actions and attitudes toward security risks so they can better safeguard themselves and their companies.

Cyber threat analysts’ responsibilities go beyond ensuring a system’s technical integrity. They should also be mindful of the impact their work can have on underrepresented communities and broader society. Cyber threat analysts, for instance, need to be aware of how their work can affect others with fewer resources or less technical understanding since implementing new security measures can outsize them. They should also be mindful of the need to strike a balance between security, privacy, and civil freedoms and take steps to prevent their efforts from undermining those values.

Cyber threat analysts must have a solid grounding in social science research and concepts in light of the ever-increasing frequency of cyber risks and destructive actions. Effective techniques for protecting our networks and data can be developed by cyber threat analysts who have a thorough grasp of the interplay between technology, people, and organizations (Boletsis et al., 2021). They must also make sure that their work does not lead to an infringement of our privacy or other civil freedoms and that they are conscious of the effects their work could have on vulnerable populations. Cyber threat analysts can aid in the security of our networks and data by learning from and using the lessons of the social sciences.

In conclusion, cyber threat analysts play a crucial role in ensuring the security of our networks and data, and they need training in social science to accomplish their jobs well. To effectively identify and counteract the risks presented by cyber-attacks, familiarity with systems thinking, risk management, and the psychology of security is essential. Cyber threat analysts must also be sensitive to the ways in which their work may affect underrepresented communities and the larger community and take precautions to avoid undermining fundamental rights to privacy and free expression. Cyber threat analysts can protect our privacy and the integrity of our data and networks if they grasp and use these ideas.

References

Boletsis, C., Halvorsrud, R., Pickering, J. B., Phillips, S. C., & Surridge, M. (2021, February). Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment. In VISIGRAPP (3: IVAPP) (pp. 266-274).

Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczyk, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security, 2018(1), 1-3.

King, Z. M., Henshel, D. S., Flora, L., Cains, M. G., Hoffman, B., & Sample, C. (2018). Characterizing and measuring maliciousness for cybersecurity risk assessment. Frontiers in Psychology, 9, 39.

Leave a Reply

Your email address will not be published. Required fields are marked *